How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Smart card, a highly reliable and portable security device
Proceedings on Advances in cryptology---CRYPTO '86
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Smart cards: principles, practice, applications
Smart cards: principles, practice, applications
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
IEEE Micro
Increasing the Bitlength of a Crypto-Coprocessor
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
High-speed implementation methods for RSA scheme
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Sign change fault attacks on elliptic curve cryptosystems
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
On quisquater's multiplication algorithm
Cryptography and Security
I: Basic technologies: TESS: A security system based on discrete exponentiation
Computer Communications
Hi-index | 0.00 |
Algorithms best suited for flexible smart card applications are based on public key cryptosystems -- RSA, zero-knowledge protocols ... Their practical implementation (execution in 驴 1 second) entails a computing power beyond the reach of classical smart cards, since large integers (512 bits) have to be manipulated in complex ways (exponentiation). CORSAIR achieves up to 40 (8 bit) MIPS with a clock speed of 6 Mhz. This allows to compute XE mod M, with 512 bit operands, in less than 1.5 second (0.4 sec for a signature). The new smart card is in the final design stage; the first test chips should be available by the end of 1990.